Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer Mac Boost Advice IObit Coupons A Good Utility Program From IObit IObit Promo Codes IObit Coupon Codes IObit Coupons and Deals FAQs Driver Booster Pro Review

I'm being hijacked/redirected with google and bing


jdell12

Recommended Posts

Hey Everyone-

 

My searchers (mainly use google) are being re-directed to other sites. The search does present multiple sites, but when I click on a link, it's redirected. The only way I can access a site is to type out the url in its entireity. I've attached the log file here. Please let me know what keys to delete as I'm no pro. :-? Thanks.

 

 

Logfile of IObit HijackScan v0.2.0.0

Scan saved at 20:26:9, on 2011-1-18

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\csrss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\ibmpmsvc.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Symantec AntiVirus\Smc.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\LANDesk\Shared Files\residentagent.exe

C:\Program Files\Common Files\Numara Software\Deploy\ChannelDeploy.sys

C:\Program Files\Numara Software\Deploy\Client\PTClient.exe

C:\Program Files\Juniper Networks\Common Files\dsNcService.exe

C:\Program Files\LANDesk\LDClient\LocalSch.EXE

C:\WINDOWS\system32\CBA\pds.exe

C:\Program Files\LANDesk\LDClient\tmcsvc.exe

C:\Program Files\IObit\IObit Security 360\IS360srv.exe

C:\Program Files\LANDesk\LDClient\issuser.exe

C:\Program Files\Common Files\Juniper Networks\JUNS\dsAccessService.exe

C:\Program Files\LANDesk\LDClient\policy.client.invoker.exe

C:\Program Files\LeapFrog\LeapFrog Connect\CommandService.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Numara Software\Deploy\PRISMXL.SYS

C:\Program Files\LANDesk\LDClient\softmon.exe

C:\Program Files\LANDesk\LDClient\collector.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Symantec AntiVirus\Rtvscan.exe

C:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe

C:\WINDOWS\System32\TPHDEXLG.exe

C:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe

C:\WINDOWS\vsAOD.Exe

C:\Program Files\LANDesk\LDClient\LDregwatch.exe

C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

c:\program files\lenovo\system update\suservice.exe

C:\WINDOWS\System32\alg.exe

C:\WINDOWS\system32\wbem\unsecapp.exe

C:\WINDOWS\system32\wbem\wmiprvse.exe

C:\Program Files\LANDesk\LDClient\rcgui.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe

C:\Program Files\Symantec AntiVirus\SmcGui.exe

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\Common Files\Symantec Shared\ccApp.exe

C:\WINDOWS\system32\TpShocks.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Zamaan's Software\Browser Hijack Retaliator 4.5\BHR.exe

C:\Program Files\IObit\IObit Security 360\IS360tray.exe

C:\Program Files\Spybot

C:\WINDOWS\Twain_32\CA561A\SnapDetect.exe

C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\IObit\IObit Security 360\is360.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\IObit\IObit Security 360\a_hijackscan.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

O4 - HKCU\Software\Microsoft\Windows\CurrentVersion\Run\: [spybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [synTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: []

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [TpShocks] TpShocks.exe

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [TaskTray]

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [bHR] C:\Program Files\Zamaan's Software\Browser Hijack Retaliator 4.5\BHR.exe

O4 - HKLM\Software\Microsoft\Windows\CurrentVersion\Run\: [iObit Security 360] "C:\Program Files\IObit\IObit Security 360\IS360tray.exe" /autostart

O9 - Extra button: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} -

O9 - Extra button: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000}SwCtl.SwCtl.11 - http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C}SoftwareDistribution.WebControl.1 - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1241562537453

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3}SoftwareDistribution.MicrosoftUpdateWebControl.1 - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1241562403703

O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93}Java Plug-in 1.6.0_13 - http://dl8-cdn-09.sun.com/s/ESD7/JSCDL/jdk/6u13-b03/jinstall-6u13-windows-i586-jc.cab?e=1241620506429&h=c3836c3c73edc0143adb24873568644f/&filename=jinstall-6u13-windows-i586-jc.cab

O16 - DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}Java Plug-in 1.6.0_13 - http://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab

O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}Java Plug-in 1.6.0_13 - http://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab

O16 - DPF: {CF84DAC5-A4F5-419E-A0BA-C01FFD71112F}SRLDetection_Intel.SysInfo.1 - http://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_intel_4.3.16.0.cab

O16 - DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B}dsATLSetupCtrlXP.JuniperSetupControlX.1 - https://juniper.net/dana-cached/setup/JuniperSetupSP1.cab

O16 - DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F}dsATLSetupCtrl.JuniperSetupClientCont.1 - https://juniper.net/dana-cached/sc/JuniperSetupClient.cab

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: LANDesk® Management Agent - LANDesk Software, Ltd. - C:\Program Files\LANDesk\Shared Files\residentagent.exe

O23 - Service: Symantec Event Manager - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Symantec Settings Manager - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Channel Deployer - Numara Software, Inc. - C:\Program Files\Common Files\Numara Software\Deploy\ChannelDeploy.sys

O23 - Service: Juniper Network Connect Service - Juniper Networks - C:\Program Files\Juniper Networks\Common Files\dsNcService.exe

O23 - Service: ThinkPad PM Service - Lenovo - C:\WINDOWS\system32\ibmpmsvc.exe

O23 - Service: Intel Local Scheduler Service - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\LocalSch.EXE

O23 - Service: Intel PDS - LANDesk Software Ltd. - C:\WINDOWS\system32\CBA\pds.exe

O23 - Service: LANDesk Targeted Multicast - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\tmcsvc.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: IS360service - IObit - C:\Program Files\IObit\IObit Security 360\IS360srv.exe

O23 - Service: LANDesk Remote Control Service - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\issuser.exe

O23 - Service: Java Quick Starter - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Juniper Unified Network Service - Juniper Networks - C:\Program Files\Common Files\Juniper Networks\JUNS\dsAccessService.exe

O23 - Service: LANDesk Policy Invoker - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\policy.client.invoker.exe

O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe

O23 - Service: LeapFrog Connect Device Service - LeapFrog Enterprises, Inc. - C:\Program Files\LeapFrog\LeapFrog Connect\CommandService.exe

O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LIVEUP~1\LUCOMS~1.EXE

O23 - Service: PrismXL - Numara Software, Inc. - C:\Program Files\Common Files\Numara Software\Deploy\PRISMXL.SYS

O23 - Service: Symantec Auto-upgrade Agent - Unknown - C:\Program Files\Symantec AntiVirus\SmcLU\Setup\smcinst.exe

O23 - Service: Symantec Management Client - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Smc.exe

O23 - Service: Symantec Network Access Control - Symantec Corporation - C:\Program Files\Symantec AntiVirus\SNAC.EXE

O23 - Service: LANDesk® Software Monitoring Service - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\softmon.exe

O23 - Service: SoundMAX Agent Service - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe

O23 - Service: System Update - Lenovo Group Limited - c:\program files\lenovo\system update\suservice.exe

O23 - Service: Symantec Endpoint Protection - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

O23 - Service: ThinkVantage Registry Monitor Service - Lenovo Group Limited - C:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe

O23 - Service: ThinkPad HDD APS Logging Service - Lenovo. - C:\WINDOWS\system32\TPHDEXLG.exe

O23 - Service: TVT Scheduler - Lenovo Group Limited - C:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe

O23 - Service: Visionsoft Audit On Demand Service - Visionsoft Limited - C:\WINDOWS\vsAOD.Exe

O23 - Service: Yahoo! Updater - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

hijacked 1-18-11.txt

Link to comment
Share on other sites

Hello and welcome to IOBit Forums. My name is Dave. I will be helping you out with your particular problem on your computer.

 

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.

2. The fixes are specific to your problem and should only be used for this issue on this machine.

3. If you don't know or understand something, please don't hesitate to ask.

4. Please DO NOT run any other tools or scans while I am helping you.

5. It is important that you reply to this thread. Do not start a new topic.

6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.

7. Absence of symptoms does not mean that everything is clear.

 

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.

Sorry for being so late in getting to your post.

 

SUPERAntiSpyware

 

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

 

Download SuperAntispyware Free Edition (SAS)

* Double-click the icon on your desktop to run the installer.

* When asked to Update the program definitions, click Yes

* If you encounter any problems while downloading the updates, manually download and unzip them from here

* Next click the Preferences button.

 

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts

* Click the Scanning Control tab.

* Under Scanner Options make sure only the following are checked:

 

•Close browsers before scanning

•Scan for tracking cookies

•Terminate memory threats before quarantining

Please leave the others unchecked

 

•Click the Close button to leave the control center screen.

 

* On the main screen click Scan your computer

* On the left check the box for the drive you are scanning.

* On the right choose Perform Complete Scan

* Click Next to start the scan. Please be patient while it scans your computer.

* After the scan is complete a summary box will appear. Click OK

* Make sure everything in the white box has a check next to it, then click Next

* It will quarantine what it found and if it asks if you want to reboot, click Yes

 

•To retrieve the removal information please do the following:

•After reboot, double-click the SUPERAntiSpyware icon on your desktop.

•Click Preferences. Click the Statistics/Logs tab.

 

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

 

•It will open in your default text editor (preferably Notepad).

•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

 

* Save the log somewhere you can easily find it. (normally the desktop)

* Click close and close again to exit the program.

*Copy and Paste the log in your post.

******************************************

 

 

Please download Malwarebytes Anti-Malware from here.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

 

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

****************************************************

Download Security Check by screen317 from one of the following links and save it to your desktop.

 

Link 1

Link 2

 

* Unzip SecurityCheck.zip and a folder named Security Check should appear.

* Open the Security Check folder and double-click Security Check.bat

* Follow the on-screen instructions inside of the black box.

* A Notepad document should open automatically called checkup.txt

* Post the contents of that document in your next reply.

 

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.

Link to comment
Share on other sites

SUPERAntiSpyware Scan Log

http://www.superantispyware.com

 

Generated 01/18/2011 at 10:25 PM

 

Application Version : 4.48.1000

 

Core Rules Database Version : 6230

Trace Rules Database Version: 4042

 

Scan type : Complete Scan

Total Scan Time : 01:15:25

 

Memory items scanned : 664

Memory threats detected : 0

Registry items scanned : 7079

Registry threats detected : 0

File items scanned : 59848

File threats detected : 80

 

Adware.Tracking Cookie

C:\Documents and Settings\training\Cookies\training@admarketplace[1].txt

C:\Documents and Settings\training\Cookies\training@ad.zanox[2].txt

C:\Documents and Settings\training\Cookies\training@crackle[1].txt

C:\Documents and Settings\training\Cookies\training@zbox.zanox[2].txt

C:\Documents and Settings\training\Cookies\training@www.cpcadnet[1].txt

C:\Documents and Settings\training\Cookies\training@adserving.ezanga[2].txt

C:\Documents and Settings\training\Cookies\training@media6degrees[1].txt

C:\Documents and Settings\training\Cookies\training@internettrafficbuilder[2].txt

C:\Documents and Settings\training\Cookies\training@clickpayz3.91447.information-seeking[1].txt

C:\Documents and Settings\training\Cookies\training@lucidmedia[1].txt

C:\Documents and Settings\training\Cookies\training@adecn[2].txt

C:\Documents and Settings\training\Cookies\training@www.businessfind[2].txt

C:\Documents and Settings\training\Cookies\training@businessfind[1].txt

C:\Documents and Settings\training\Cookies\training@click.fastpartner[2].txt

C:\Documents and Settings\training\Cookies\training@dc.tremormedia[2].txt

C:\Documents and Settings\training\Cookies\training@clickpayz4.91452.information-seeking[1].txt

C:\Documents and Settings\training\Cookies\training@top5countdown.mevio[2].txt

C:\Documents and Settings\training\Cookies\training@ads.blogtalkradio[1].txt

C:\Documents and Settings\training\Cookies\training@www.plomedia[1].txt

C:\Documents and Settings\training\Cookies\training@bridge1.admarketplace[1].txt

C:\Documents and Settings\training\Cookies\training@myroitracking[2].txt

C:\Documents and Settings\training\Cookies\training@collective-media[1].txt

C:\Documents and Settings\training\Cookies\training@clickpayz7.91452.information-seeking[1].txt

C:\Documents and Settings\training\Cookies\training@www.cpcadnet[2].txt

C:\Documents and Settings\training\Cookies\training@chitika[1].txt

C:\Documents and Settings\training\Cookies\training@adserver.adtechus[1].txt

C:\Documents and Settings\training\Cookies\training@network.realmedia[2].txt

C:\Documents and Settings\training\Cookies\training@findincaso[1].txt

C:\Documents and Settings\training\Cookies\training@mediabrandsww[1].txt

C:\Documents and Settings\training\Cookies\training@www.icityfind[1].txt

C:\Documents and Settings\training\Cookies\training@ads.undertone[3].txt

C:\Documents and Settings\training\Cookies\training@kontera[2].txt

C:\Documents and Settings\training\Cookies\training@ads.pubmatic[1].txt

C:\Documents and Settings\training\Cookies\training@realmedia[1].txt

C:\Documents and Settings\training\Cookies\training@invitemedia[1].txt

C:\Documents and Settings\training\Cookies\training@n-traffic[1].txt

C:\Documents and Settings\training\Cookies\training@advertise[2].txt

C:\Documents and Settings\training\Cookies\training@www.findstuff[2].txt

C:\Documents and Settings\training\Cookies\training@clickthrough.kanoodle[1].txt

cdn4.specificclick.net [ C:\Documents and Settings\152190\Application Data\Macromedia\Flash Player\#SharedObjects\QP3YJEFU ]

udn.specificclick.net [ C:\Documents and Settings\152190\Application Data\Macromedia\Flash Player\#SharedObjects\QP3YJEFU ]

media.celebritycruises.com [ C:\Documents and Settings\Administrator\134739\Application Data\Macromedia\Flash Player\#SharedObjects\WKX6WDXG ]

serving-sys.com [ C:\Documents and Settings\Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\H7KAB4RK ]

adsatt.espn.go.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

cdn.eyewonder.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

cdn2.invitemedia.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

content.yieldmanager.edgesuite.net [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

core.insightexpressai.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

crackle.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

files.youporn.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

ia.media-imdb.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

media.heavy.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

media.mtvnservices.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

media.scanscout.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

media1.break.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

msnbcmedia.msn.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

parksandresorts.wdpromedia.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

s0.2mdn.net [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

secure-us.imrworldwide.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

sexier.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

video.redorbit.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

wdw1.wdpromedia.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

http://www.crosscounty.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

http://www.naiadsystems.com [ C:\Documents and Settings\training\Application Data\Macromedia\Flash Player\#SharedObjects\8R3RKFVL ]

C:\Documents and Settings\training\Cookies\training@a1.interclick[1].txt

C:\Documents and Settings\training\Cookies\training@ads.undertone[2].txt

C:\Documents and Settings\training\Cookies\training@ar.atwola[1].txt

C:\Documents and Settings\training\Cookies\training@ar.atwola[2].txt

C:\Documents and Settings\training\Cookies\training@ar.atwola[3].txt

C:\Documents and Settings\training\Cookies\training@ar.atwola[4].txt

C:\Documents and Settings\training\Cookies\training@ar.atwola[7].txt

C:\Documents and Settings\training\Cookies\training@at.atwola[1].txt

C:\Documents and Settings\training\Cookies\training@at.atwola[2].txt

C:\Documents and Settings\training\Cookies\training@crosscounty[1].txt

C:\Documents and Settings\training\Cookies\training@imrworldwide[2].txt

C:\Documents and Settings\training\Cookies\training@interclick[2].txt

C:\Documents and Settings\training\Cookies\training@invitemedia[2].txt

C:\Documents and Settings\training\Cookies\training@revsci[1].txt

C:\Documents and Settings\training\Cookies\training@www.crosscounty[1].txt

serving-sys.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\H7KAB4RK ]

 

 

Malwarebytes' Anti-Malware 1.50.1.1100

http://www.malwarebytes.org

 

Database version: 5551

 

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

 

1/19/2011 7:47:05 AM

mbam-log-2011-01-19 (07-47-05).txt

 

Scan type: Full scan (C:\|)

Objects scanned: 233396

Time elapsed: 1 hour(s), 17 minute(s), 55 second(s)

 

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 4

 

Memory Processes Infected:

(No malicious items detected)

 

Memory Modules Infected:

(No malicious items detected)

 

Registry Keys Infected:

(No malicious items detected)

 

Registry Values Infected:

(No malicious items detected)

 

Registry Data Items Infected:

(No malicious items detected)

 

Folders Infected:

(No malicious items detected)

 

Files Infected:

c:\system volume information\_restore{eec50ae2-6d2c-4c55-a787-7681386f4d9a}\RP140\A0050285.exe (Rogue.MalwareSweeper) -> Quarantined and deleted successfully.

c:\system volume information\_restore{eec50ae2-6d2c-4c55-a787-7681386f4d9a}\RP140\A0050290.dll (Malware.Trace) -> Quarantined and deleted successfully.

c:\system volume information\_restore{eec50ae2-6d2c-4c55-a787-7681386f4d9a}\RP140\A0050291.exe (Rogue.MalwareSweeper) -> Quarantined and deleted successfully.

c:\system volume information\_restore{eec50ae2-6d2c-4c55-a787-7681386f4d9a}\RP140\A0050293.dll (Rogue.MalwareSweeper) -> Quarantined and deleted successfully.

 

When I run the Security Check program, the black box opens and it says "collecting information" then says "collecting information done" then it says "preparing", "preparing done" then nothing else happens. So I have no txt file to post here for this program. Am I doing something wrong?

Link to comment
Share on other sites

When I run the Security Check program, the black box opens and it says "collecting information" then says "collecting information done" then it says "preparing", "preparing done" then nothing else happens. So I have no txt file to post here for this program. Am I doing something wrong?

You can look in the folder "Security Check" for the txt file. If you can't find it, don't worry.

 

Please download ComboFix http://img7.imageshack.us/img7/4930/combofix.gif from BleepingComputer.com

 

Alternate link: GeeksToGo.com

 

and save it to your Desktop.

Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here

Double click ComboFix.exe & follow the prompts.

As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console

http://img.photobucket.com/albums/v666/sUBs/Query_RC.gif

Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

 

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

http://img.photobucket.com/albums/v666/sUBs/RC_successful.gif

 

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the contents of C:\ComboFix.txt in your next reply.

 

If you have problems with ComboFix usage, see How to use ComboFix

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...